Are the programmes we run secure? Will the software that is in the process of development be secure? The only certainty we have is that all software can contain weaknesses or vulnerabilities. These cracks can allow a person with unwanted intentions to gain access to the program. He or she could, for example, malfunction it […]
We live in a hyper-connected world. Our smartphones, home automation systems or IoT devices used by some utilities are connected to highly complex communications networks that need to be monitored from a radioelectric point of view. In this monitoring of radiofrequency signals there is an essential function to prevent incidents such as interference or a […]
On the Día das Letras Galegas we bring you the story of the Galician technologist María Wonenburger, who had to confront her father and her time to devote herself to mathematics.
Valida allows an effective response in the fight against document and identity fraud. This solution is being used by companies from financial sector, banking, insurance and public organizations.
We are immersed in an environment in which we continually hear about Industry 4.0 and the application of technologies such as IoT or Artificial Intelligence to solve multiple problems and use cases that may arise in a manufacturing environment. Typical examples may be defect reduction and prescription of industrial process parameters, logistics optimization, or even […]
The possibilities offered by 5G technologies are practically endless, but it is necessary to know from the inside all the advantages that these technologies provide to companies. The work we are developing within the framework of the Open-VERSO National Network of Excellence allows us to specialize in 5G enabling technologies.
The huge digital divide between citizens in different countries is a major issue that is often not given the attention it deserves. How can ICTs improve the lives of the most vulnerable?
The current industrial modernization requires a deployment of communication networks that allow the operation and monitorization of diverse processes, such as water distribution or electricity generation. This cluster of neworks belongs to what is commonly known as Operation Technology (OT), which is sensible to suffer from different kinds of cyberattacks that may cause security breaches, […]
Today we can find monuments, restaurants or shops in one click, but are these technologies safe for our privacy? In this post we will review Geo-indistinguishability, one of the anonymization techniques used to anonymize the geographic location of an individual.
Today, more than ever, the world depends on energy. However, we know that much of this energy is produced through environmentally unfriendly processes, so balancing the progressive energy dependence with the care of the planet has become one of the main challenges of the decade. The United Nations recognizes this in its Sustainable Development Goals […]
The digitalisation of public administration services is nowadays an essential part of the Digital Single Market strategy to improve the access to goods and services across Europe for both citizens and businesses. In many cases, access to specific public services requires secure and trustful identification and management of the so called ‘digital identities’. Traditionally, digital […]
The creation of the fifth-generation mobile network is changing the way people communicate while bringing us closer to total connectivity of everyday objects in a faster way. These advances will make it possible to increase the number of connected devices to obtain and share information in real time, facilitating the development and creation of new […]